This paper proposes a semantic open IoT service platform to improve interoperability between IoT devices and enable easy use of IoT services. The platform provides semantic-based IoT information services and semantic interoperability of device data. It allows developers to access IoT resources through a unified interface rather than requiring direct integration with specific IoT middleware systems. The platform uses semantic technologies like ontologies, linked open data, and inference to process and share sensor data between applications in a standardized way.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
1. The document discusses the concept of developing a mobile application for an educational portal to enable e-learning through wireless devices. It aims to allow students to access study materials, take tests, and view evaluation results on their mobile devices.
2. The proposed system would generate analysis of student performance both individually and in groups to help assess learning and share knowledge among peers.
3. The model could be implemented as a massive open online course (MOOC) across multiple institutions to provide interactive study forums and networking opportunities for students.
The document proposes a standardized system called the Digital Locker Technology Specification (DLTS) to issue government documents electronically to Aadhaar holders. This would allow documents to be stored digitally and shared with agencies in real-time, eliminating the need for physical documents. The system would use Aadhaar numbers to authenticate document owners and prevent fraud. It describes key aspects of electronic documents like being machine-readable, printable, shareable, tamper-evident, and verifiable. The proposed architecture involves multiple digital repositories storing documents in a federated manner, with documents being issued, stored, and accessible online through a digital locker portal.
A Web Link (Teacher-student portal) project that
acts as an online portal between students and the Teacher.
The system is designed for a particular branch such as
diploma. Teacher can ad Notes, Assignment, e-book.
Smart information desk system with voice assistant for universities IJECEIAES
This article aims to develop a smart information desk system through a smart mirror for universities. It is a mirror with extra capabilities of displaying answers for academic inquiries such as asking about the lecturers’ office numbers and hours, exams dates and times on the mirror surface. In addition, the voice recognition feature was used to answer spoken inquiries in audio responds to serve all types of users including disabled ones. Furthermore, the system showed general information such as date, weather, time and the university map. The smart mirror was connected to an outdoor camera to monitor the traffics at the university entrance gate. The system was implemented on a Raspberry Pi 4 model B connected to a two-way mirror and an infrared (IR) touch frame. The results of this study helped to overcome the problem of the information desk absence in the university. Therefore, it helped users to save their time and effort in making requests for important academic information.
Benchmarking supervised learning models for sentiment analysisConference Papers
This document summarizes a study that benchmarks the performance of two models - BiLSTM and FastText - on three sentiment analysis datasets. BiLSTM performed better in all tasks but was 15,000% slower to train than FastText. The datasets included an Amazon product reviews dataset, a Twitter sentiment dataset, and a financial domain-specific dataset collected by the authors. The study aimed to determine the most suitable algorithm while considering factors like speed, hardware usage, and resources.
The internet of things is an emerging technology that is currently present in most processes and devices, allowing to improve the quality of life of people and facilitating the access to specific information and services. The main purpose of the present article is to offer a general overview of internet of things, based on the analysis of recently published work. The added value of this article lies in the analysis of the main recent publications and the diversity of applications of internet of things technology. As a result of the analysis of the current literature, internet of things technology stands out as a facilitator in business and industrial performance but above all in improving the quality of life. As a conclusion to this document, the internet of things is a technology that can overcome the challenges in terms of security, processing capacity and data mobility, as long as the development related to other technologies follows its expected course.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
1. The document discusses the concept of developing a mobile application for an educational portal to enable e-learning through wireless devices. It aims to allow students to access study materials, take tests, and view evaluation results on their mobile devices.
2. The proposed system would generate analysis of student performance both individually and in groups to help assess learning and share knowledge among peers.
3. The model could be implemented as a massive open online course (MOOC) across multiple institutions to provide interactive study forums and networking opportunities for students.
The document proposes a standardized system called the Digital Locker Technology Specification (DLTS) to issue government documents electronically to Aadhaar holders. This would allow documents to be stored digitally and shared with agencies in real-time, eliminating the need for physical documents. The system would use Aadhaar numbers to authenticate document owners and prevent fraud. It describes key aspects of electronic documents like being machine-readable, printable, shareable, tamper-evident, and verifiable. The proposed architecture involves multiple digital repositories storing documents in a federated manner, with documents being issued, stored, and accessible online through a digital locker portal.
A Web Link (Teacher-student portal) project that
acts as an online portal between students and the Teacher.
The system is designed for a particular branch such as
diploma. Teacher can ad Notes, Assignment, e-book.
Smart information desk system with voice assistant for universities IJECEIAES
This article aims to develop a smart information desk system through a smart mirror for universities. It is a mirror with extra capabilities of displaying answers for academic inquiries such as asking about the lecturers’ office numbers and hours, exams dates and times on the mirror surface. In addition, the voice recognition feature was used to answer spoken inquiries in audio responds to serve all types of users including disabled ones. Furthermore, the system showed general information such as date, weather, time and the university map. The smart mirror was connected to an outdoor camera to monitor the traffics at the university entrance gate. The system was implemented on a Raspberry Pi 4 model B connected to a two-way mirror and an infrared (IR) touch frame. The results of this study helped to overcome the problem of the information desk absence in the university. Therefore, it helped users to save their time and effort in making requests for important academic information.
Benchmarking supervised learning models for sentiment analysisConference Papers
This document summarizes a study that benchmarks the performance of two models - BiLSTM and FastText - on three sentiment analysis datasets. BiLSTM performed better in all tasks but was 15,000% slower to train than FastText. The datasets included an Amazon product reviews dataset, a Twitter sentiment dataset, and a financial domain-specific dataset collected by the authors. The study aimed to determine the most suitable algorithm while considering factors like speed, hardware usage, and resources.
The internet of things is an emerging technology that is currently present in most processes and devices, allowing to improve the quality of life of people and facilitating the access to specific information and services. The main purpose of the present article is to offer a general overview of internet of things, based on the analysis of recently published work. The added value of this article lies in the analysis of the main recent publications and the diversity of applications of internet of things technology. As a result of the analysis of the current literature, internet of things technology stands out as a facilitator in business and industrial performance but above all in improving the quality of life. As a conclusion to this document, the internet of things is a technology that can overcome the challenges in terms of security, processing capacity and data mobility, as long as the development related to other technologies follows its expected course.
This document proposes a cloud-based system to remotely monitor vital health statistics using Internet of Things (IoT). The system would allow children living abroad to monitor parents' health statistics. IoT devices like thermometers and blood pressure monitors would send readings to a smartphone app. The app would send anonymized data like user ID, device ID, and readings to a cloud database. Authorized users could access the aggregate data on a web portal. The system would also send reminders to users and monitors to ensure regular health checks. The goal is to help people remotely monitor loved ones' health with consistency and reliability despite long distances.
This document proposes Earp, a new mobile platform that uses the relational model as the unified OS-level abstraction for app data storage and inter-app data sharing. Earp provides apps with structure-aware, OS-enforced access control to address the inadequate protection of user data in existing mobile platforms. The key contributions of Earp include using the relational model to specify access rights as part of the data model, a uniform data access abstraction enforced by a reference monitor with visibility into app data structures, and a prototype implementation on Firefox OS that adds these protections while maintaining support for legacy APIs.
Review of big data analytics (bda) architecture trends and analysis Conference Papers
This document reviews big data analytics (BDA) architecture trends and analysis. It discusses the evolution of data analytics from ancient times to modern technologies like Hadoop and Spark. It describes key features of BDA like flexibility, scalability, and fault tolerance. Common BDA architectures like lambda and kappa architectures are summarized. The lambda architecture uses batch, speed, and serving layers to handle both real-time and batch processing. The kappa architecture simplifies this by removing the batch layer and handling all processing through streaming. Overall, the document provides a high-level overview of BDA architectures and technologies.
Technology has reshaped the way we interact with the world and access information
with the advent of smartphones. Accordingly, the needs we have and the solutions for our
needs have also changed along with the evolving technology. One of the most affected
matters from technology is communication. With the various options and capabilities,
instant messaging applications have been started to use for communication purpose
which is one of the biggest needs of human being. We can send text messages, video
messages, voice recordings and share locations using these applications. Even further,
we no longer need cell phone calls by GSM operators, and instead prefer these
applications for instant calls, as well as sharing private information with these
applications, not only for personal daily life, also for business need. On the other hand,
these applications bring risks with many benefits. One of them is privacy. We do not want
that these applications can store our personal data as its user. How do our best practices
keep our data? Do they give the necessary attention for privacy? Another fact is that these
applications can be used by criminals to communicate and execute a secret plan. If a
criminal gets caught, what can be obtained as evidence from these messaging
applications? This time we need to know what can be extracted from the mobile device.
This research focuses on forensics analysis of the instant messaging applications on the
Android platform
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...Rida Qayyum
With the explosive growth of mobile applications and extensive praxis of cloud computing, mobile cloud computing has been introduced to be a potential technology for mobile services. But privacy is the main concern for a mobile user in the modern era. In the current study, we address the privacy challenges faced by mobile users while outsourcing their data to the service provider for storage and processing. However, a secure mobile user is required to protect these fundamental privacy factors such as their personal data, real identity, current location and the actual query sent to the cloud vendor server while availing different cloud services. Under these privacy metrics, we evaluated the existing approaches that are counting privacy challenge in mobile cloud computing. The primary focus of this study is to presents a critical survey of recent privacy protection techniques. Leading to objective, the current study conduct a comparative analysis of these state of the art methods with their strong points, privacy level and scalability. After analysis, this paper suggests the pseudo-random permutation method could be a promising solution that can be taken into consideration for preserving user personal information and data query privacy in MCC more efficiently. Primarily, the purpose of the survey was to focus on further advancements of the suggested method. Furthermore, we present the future research directions in the mobile cloud computing paradigms.
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET Journal
The document presents a study on detecting noisy content on web data using machine learning techniques. It aims to identify and filter out advertisements, irrelevant data and other noisy content when users retrieve information from websites. The study uses algorithms like support vector machines, artificial neural networks, decision trees and k-nearest neighbors to classify web content as noisy or not. A proposed methodology involves training models using these machine learning algorithms and evaluating their performance for noisy content detection on web data.
This document summarizes a research paper that proposes a new e-healthcare information system based on an Android application. The paper discusses limitations of existing systems including errors, lack of access to patient information, and delays. It proposes a new system using Android mobile devices, wearable sensors to monitor biometrics, machine-to-machine communication, and a service-oriented architecture. This would allow real-time sharing of patient data between doctors and patients regardless of location. It also discusses using evolutionary computing algorithms and multi-agent frameworks to optimize medical data quality and analysis in distributed environments. The proposed system aims to improve diagnosis, treatment decisions and access to healthcare.
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
Community detection is becoming a highly demanded topic in social networking-based applications. It involves finding the maximum intraconnected and minimum inter-connected sub-graphs in given social networks. Many approaches have been developed for community’s detection and less of them have focused on the dynamical aspect of the social network. The decision of the community has to consider the pattern of changes in the social network and to be smooth enough. This is to enable smooth operation for other community detection dependent application. Unlike dynamical community detection Algorithms, this article presents a non-dominated aware searching Algorithm designated as non-dominated sorting based community detection with dynamical awareness (NDS-CD-DA). The Algorithm uses a non-dominated sorting genetic algorithm NSGA-II with two objectives: modularity and normalized mutual information (NMI). Experimental results on synthetic networks and real-world social network datasets have been compared with classical genetic with a single objective and has been shown to provide superiority in terms of the domination as well as the convergence. NDS-CD-DA has accomplished a domination percentage of 100% over dynamic evolutionary community searching DECS for almost all iterations.
This document proposes a QR-code authentication framework for accessing medical images on Android devices. It describes a system where QR-codes encoded with encrypted patient data are used to authenticate users and search for patient records and images stored on a cloud server. The system was implemented as an Android app called "D's Viewer" that allows scanning QR-codes to lookup and view DICOM medical images from the cloud database. The framework is intended to help clinics and doctors in remote areas develop their own mobile medical image retrieval systems at a lower cost.
Improvement from proof of concept into the production environment cater for...Conference Papers
This document discusses improvements made to the Trust Engine component of an authentication platform to improve performance and scalability. The Proof of Concept system was found to not meet scalability requirements due to the database architecture requiring multiple connections to retrieve and update user data. The improvements included consolidating configuration data, combining user tables, updating the process to perform analysis in memory without database connections, limiting stored login records, and changing to a JSON data format. Performance testing showed the new system completed processes on average 99% faster.
This document describes a mobile application called Pharmi Track that allows users to track nearby pharmacies and doctors. It discusses the need for such an application given that currently finding pharmacies and doctor availability can be difficult. The proposed system would allow users, doctors, and pharmacists to register and then users could search for and order medicines from nearby pharmacies. It would also allow users to post questions to doctors and see pharmacy and doctor recommendations. The document outlines the system design, including components, functionality, architecture, and security measures to make it reliable. It concludes the application would provide medical assistance to users by helping them find pharmacies and doctors more easily.
Information Technology of Metro (MCC)- TQMSalma Bashir
METRO Cash & Carry, international market leader in self-service wholesale, plans its market entry into Pakistan. With this move, the retailer would expand both its international presence and its activities in the important growth region Asia.
Improved indistinguishability for searchable symmetric encryptionConference Papers
This document proposes a new indistinguishability experiment for defining searchable symmetric encryption (SSE) security that includes adversaries with prior knowledge about the stored documents. It introduces an experiment where the adversary chooses two documents from a single document set, and the challenger generates a search token for a keyword appearing in one document. The adversary wins by guessing the originating document. This models adversaries exploiting a scheme's leakage. It also proposes a new SSE adversary model describing adversaries with different types and amounts of prior knowledge. The document uses SSE scheme Sophos-B to illustrate the new experiment and adversary models.
Log into android mobile to fetch the device oriented information using remote...eSAT Journals
Abstract This paper presents a platform for sharing device oriented mobile information via a local private cloud. The android application helps the user to fetch the device oriented information like missed call history, messages, battery status and GPS. Our system contains a website which helps the user to track all the required information through his personal account. Thus our system helps in making it easier to support new cloud services as output, and our android application helps in setting various triggers to push the device oriented information into the cloud. Keywords: List Android, Device oriented information, Cloud.
Log into android mobile to fetch the device oriented information using remote...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET- College Enquiry Chat-Bot using API.AIIRJET Journal
This document describes a college enquiry chatbot developed using API.ai (now known as Dialogflow). The chatbot is an Android application that allows students to get answers to their college-related queries without having to visit the college in person. It analyzes user queries using natural language processing and responds in text and audio format by integrating text-to-speech. The chatbot was built using Dialogflow to match user inputs with predefined intents and return appropriate responses from a database of FAQs. It aims to provide students with a convenient way to stay updated on college activities and information.
Context Aware Road Traffic Speech Information System from Social MediaPoo Kuan Hoong
This project develops a mobile application to transmit real-time traffic information to motorcyclists using data collected from Twitter. Traffic data from tweets is analyzed using named entity recognition, sentiment analysis, and statistical analysis to determine the traffic state. A Bluetooth-enabled helmet then plays the traffic state for the user based on their location provided by GPS coordinates.
A privacy learning objects identity system for smartphones based on a virtu...ijcsit
Smartphones are widely used today, with many features such as GPS map navigation, capturing
photos with camera equipment such as digital camera, internet connection via wifi or 3G devices that
function as computers. These devices are being used for various purposes including online learning, where
learners can study from anywhere and anytime for example in the street, home, office and school. However,
identifing a method by which teachers in these virtural environements can remember their learners “faces”
in the classroom or manage "Identification Number Student" (ID student or user) is not reliable when the
teacher cannot see all of the learners in the class or know who is online from a particular account. In this
paper, we propose a system, Android Virtual Learner Identify (AVLI), which collects images captured by
the face of the learning object directly from the camera, the location of the learner by identifing where the
learner is studying and configuration of information including Time, Mac, IP addresses, IMEI number and
location via GPS. The systen then saves learner profiles to help the teacher or education managers on the
Virtual Learning Environment (VLE) identify learning object. We used the VLE that we built on
mobile.ona.vn domain. We implemented the AVLI prototype Android phone with solution password
encryption and images taken directly from the camera to ensure that the information is transmitted and
stored securely in the Virtual Learning Environment System Database (VLE Data) of learning objects while
preserving the ability to identify learning objects by a teacher or education manager.
Information Technology (IT) is a tool like the other tools presented total quality management organization achieve its goals. Over the past few decades, computers and quality management practices have evolved together and have supported each other. This interdependence will continue in the near future. Also, IT is defined as computer technology for processing and storing information, as well as communications technology transmitting information.
Bluetooth is an essential wireless standard for short-distance and low-power wireless networks. Health
departments’ contact-tracing applications depended on Bluetooth technology to prevent infectious diseases
from spreading, especially COVID-19. The security threats of the Bluetooth-based contact-tracing
applications increased because an adversary can use them as surveillance tools that violate the user’s
privacy and revealpersonal information. The Bluetooth standard mainly depends on the device address in
its authenticated pairing mechanism (Secure Simple Pairing), which can collect with off-the-shelf
hardware and software and leads to a tracking attack. To avoid the risk of tracking based on this security
vulnerability in the Bluetooth protocol, we suggest a novel authentication protocol based on a non-
interactive zero-knowledge scheme to substitute the authentication protocol used in the Bluetooth standard.
The new protocol can replace the authentication protocol in the Bluetooth stack without any modification
in the device pairing flow. Finally, we prove the security of our proposed scheme against the man-in-the-
middle attack and tracking attack. A performance comparison with the authentication algorithm in the BLE
standard shows that our method mitigates the tracking attack with low communication messages. Our
results help enhance the contact-tracing application’s security in which Bluetooth access is available.
IRJET- Review On Semantic Open IoT Service PlatformIRJET Journal
This document discusses a review of a semantic open IoT service platform. The platform aims to provide semantic-based IoT information services and semantic interoperability between IoT devices. It allows for collecting information from smart devices in real environments and providing smart life services by sharing, distributing, and participating in open sensing information. The platform architecture consists of different domains like user, application, sensor, and processing domains. It uses semantic technologies to enable semantic interoperability between domains by representing collected data semantically.
The document proposes an Interactive Application Service (IAS) that uses cloud computing and social networking technologies to allow researchers to easily discover, share, and access applications from anywhere at any time. The IAS architecture includes a cloud infrastructure layer, IAS service layer, and social networking front-end layer. Users can run applications in the cloud through the social networking portal. The IAS has been implemented on the GeoChronos portal to enable earth observation scientists to share applications and data.
This document proposes a cloud-based system to remotely monitor vital health statistics using Internet of Things (IoT). The system would allow children living abroad to monitor parents' health statistics. IoT devices like thermometers and blood pressure monitors would send readings to a smartphone app. The app would send anonymized data like user ID, device ID, and readings to a cloud database. Authorized users could access the aggregate data on a web portal. The system would also send reminders to users and monitors to ensure regular health checks. The goal is to help people remotely monitor loved ones' health with consistency and reliability despite long distances.
This document proposes Earp, a new mobile platform that uses the relational model as the unified OS-level abstraction for app data storage and inter-app data sharing. Earp provides apps with structure-aware, OS-enforced access control to address the inadequate protection of user data in existing mobile platforms. The key contributions of Earp include using the relational model to specify access rights as part of the data model, a uniform data access abstraction enforced by a reference monitor with visibility into app data structures, and a prototype implementation on Firefox OS that adds these protections while maintaining support for legacy APIs.
Review of big data analytics (bda) architecture trends and analysis Conference Papers
This document reviews big data analytics (BDA) architecture trends and analysis. It discusses the evolution of data analytics from ancient times to modern technologies like Hadoop and Spark. It describes key features of BDA like flexibility, scalability, and fault tolerance. Common BDA architectures like lambda and kappa architectures are summarized. The lambda architecture uses batch, speed, and serving layers to handle both real-time and batch processing. The kappa architecture simplifies this by removing the batch layer and handling all processing through streaming. Overall, the document provides a high-level overview of BDA architectures and technologies.
Technology has reshaped the way we interact with the world and access information
with the advent of smartphones. Accordingly, the needs we have and the solutions for our
needs have also changed along with the evolving technology. One of the most affected
matters from technology is communication. With the various options and capabilities,
instant messaging applications have been started to use for communication purpose
which is one of the biggest needs of human being. We can send text messages, video
messages, voice recordings and share locations using these applications. Even further,
we no longer need cell phone calls by GSM operators, and instead prefer these
applications for instant calls, as well as sharing private information with these
applications, not only for personal daily life, also for business need. On the other hand,
these applications bring risks with many benefits. One of them is privacy. We do not want
that these applications can store our personal data as its user. How do our best practices
keep our data? Do they give the necessary attention for privacy? Another fact is that these
applications can be used by criminals to communicate and execute a secret plan. If a
criminal gets caught, what can be obtained as evidence from these messaging
applications? This time we need to know what can be extracted from the mobile device.
This research focuses on forensics analysis of the instant messaging applications on the
Android platform
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...Rida Qayyum
With the explosive growth of mobile applications and extensive praxis of cloud computing, mobile cloud computing has been introduced to be a potential technology for mobile services. But privacy is the main concern for a mobile user in the modern era. In the current study, we address the privacy challenges faced by mobile users while outsourcing their data to the service provider for storage and processing. However, a secure mobile user is required to protect these fundamental privacy factors such as their personal data, real identity, current location and the actual query sent to the cloud vendor server while availing different cloud services. Under these privacy metrics, we evaluated the existing approaches that are counting privacy challenge in mobile cloud computing. The primary focus of this study is to presents a critical survey of recent privacy protection techniques. Leading to objective, the current study conduct a comparative analysis of these state of the art methods with their strong points, privacy level and scalability. After analysis, this paper suggests the pseudo-random permutation method could be a promising solution that can be taken into consideration for preserving user personal information and data query privacy in MCC more efficiently. Primarily, the purpose of the survey was to focus on further advancements of the suggested method. Furthermore, we present the future research directions in the mobile cloud computing paradigms.
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET Journal
The document presents a study on detecting noisy content on web data using machine learning techniques. It aims to identify and filter out advertisements, irrelevant data and other noisy content when users retrieve information from websites. The study uses algorithms like support vector machines, artificial neural networks, decision trees and k-nearest neighbors to classify web content as noisy or not. A proposed methodology involves training models using these machine learning algorithms and evaluating their performance for noisy content detection on web data.
This document summarizes a research paper that proposes a new e-healthcare information system based on an Android application. The paper discusses limitations of existing systems including errors, lack of access to patient information, and delays. It proposes a new system using Android mobile devices, wearable sensors to monitor biometrics, machine-to-machine communication, and a service-oriented architecture. This would allow real-time sharing of patient data between doctors and patients regardless of location. It also discusses using evolutionary computing algorithms and multi-agent frameworks to optimize medical data quality and analysis in distributed environments. The proposed system aims to improve diagnosis, treatment decisions and access to healthcare.
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
Community detection is becoming a highly demanded topic in social networking-based applications. It involves finding the maximum intraconnected and minimum inter-connected sub-graphs in given social networks. Many approaches have been developed for community’s detection and less of them have focused on the dynamical aspect of the social network. The decision of the community has to consider the pattern of changes in the social network and to be smooth enough. This is to enable smooth operation for other community detection dependent application. Unlike dynamical community detection Algorithms, this article presents a non-dominated aware searching Algorithm designated as non-dominated sorting based community detection with dynamical awareness (NDS-CD-DA). The Algorithm uses a non-dominated sorting genetic algorithm NSGA-II with two objectives: modularity and normalized mutual information (NMI). Experimental results on synthetic networks and real-world social network datasets have been compared with classical genetic with a single objective and has been shown to provide superiority in terms of the domination as well as the convergence. NDS-CD-DA has accomplished a domination percentage of 100% over dynamic evolutionary community searching DECS for almost all iterations.
This document proposes a QR-code authentication framework for accessing medical images on Android devices. It describes a system where QR-codes encoded with encrypted patient data are used to authenticate users and search for patient records and images stored on a cloud server. The system was implemented as an Android app called "D's Viewer" that allows scanning QR-codes to lookup and view DICOM medical images from the cloud database. The framework is intended to help clinics and doctors in remote areas develop their own mobile medical image retrieval systems at a lower cost.
Improvement from proof of concept into the production environment cater for...Conference Papers
This document discusses improvements made to the Trust Engine component of an authentication platform to improve performance and scalability. The Proof of Concept system was found to not meet scalability requirements due to the database architecture requiring multiple connections to retrieve and update user data. The improvements included consolidating configuration data, combining user tables, updating the process to perform analysis in memory without database connections, limiting stored login records, and changing to a JSON data format. Performance testing showed the new system completed processes on average 99% faster.
This document describes a mobile application called Pharmi Track that allows users to track nearby pharmacies and doctors. It discusses the need for such an application given that currently finding pharmacies and doctor availability can be difficult. The proposed system would allow users, doctors, and pharmacists to register and then users could search for and order medicines from nearby pharmacies. It would also allow users to post questions to doctors and see pharmacy and doctor recommendations. The document outlines the system design, including components, functionality, architecture, and security measures to make it reliable. It concludes the application would provide medical assistance to users by helping them find pharmacies and doctors more easily.
Information Technology of Metro (MCC)- TQMSalma Bashir
METRO Cash & Carry, international market leader in self-service wholesale, plans its market entry into Pakistan. With this move, the retailer would expand both its international presence and its activities in the important growth region Asia.
Improved indistinguishability for searchable symmetric encryptionConference Papers
This document proposes a new indistinguishability experiment for defining searchable symmetric encryption (SSE) security that includes adversaries with prior knowledge about the stored documents. It introduces an experiment where the adversary chooses two documents from a single document set, and the challenger generates a search token for a keyword appearing in one document. The adversary wins by guessing the originating document. This models adversaries exploiting a scheme's leakage. It also proposes a new SSE adversary model describing adversaries with different types and amounts of prior knowledge. The document uses SSE scheme Sophos-B to illustrate the new experiment and adversary models.
Log into android mobile to fetch the device oriented information using remote...eSAT Journals
Abstract This paper presents a platform for sharing device oriented mobile information via a local private cloud. The android application helps the user to fetch the device oriented information like missed call history, messages, battery status and GPS. Our system contains a website which helps the user to track all the required information through his personal account. Thus our system helps in making it easier to support new cloud services as output, and our android application helps in setting various triggers to push the device oriented information into the cloud. Keywords: List Android, Device oriented information, Cloud.
Log into android mobile to fetch the device oriented information using remote...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET- College Enquiry Chat-Bot using API.AIIRJET Journal
This document describes a college enquiry chatbot developed using API.ai (now known as Dialogflow). The chatbot is an Android application that allows students to get answers to their college-related queries without having to visit the college in person. It analyzes user queries using natural language processing and responds in text and audio format by integrating text-to-speech. The chatbot was built using Dialogflow to match user inputs with predefined intents and return appropriate responses from a database of FAQs. It aims to provide students with a convenient way to stay updated on college activities and information.
Context Aware Road Traffic Speech Information System from Social MediaPoo Kuan Hoong
This project develops a mobile application to transmit real-time traffic information to motorcyclists using data collected from Twitter. Traffic data from tweets is analyzed using named entity recognition, sentiment analysis, and statistical analysis to determine the traffic state. A Bluetooth-enabled helmet then plays the traffic state for the user based on their location provided by GPS coordinates.
A privacy learning objects identity system for smartphones based on a virtu...ijcsit
Smartphones are widely used today, with many features such as GPS map navigation, capturing
photos with camera equipment such as digital camera, internet connection via wifi or 3G devices that
function as computers. These devices are being used for various purposes including online learning, where
learners can study from anywhere and anytime for example in the street, home, office and school. However,
identifing a method by which teachers in these virtural environements can remember their learners “faces”
in the classroom or manage "Identification Number Student" (ID student or user) is not reliable when the
teacher cannot see all of the learners in the class or know who is online from a particular account. In this
paper, we propose a system, Android Virtual Learner Identify (AVLI), which collects images captured by
the face of the learning object directly from the camera, the location of the learner by identifing where the
learner is studying and configuration of information including Time, Mac, IP addresses, IMEI number and
location via GPS. The systen then saves learner profiles to help the teacher or education managers on the
Virtual Learning Environment (VLE) identify learning object. We used the VLE that we built on
mobile.ona.vn domain. We implemented the AVLI prototype Android phone with solution password
encryption and images taken directly from the camera to ensure that the information is transmitted and
stored securely in the Virtual Learning Environment System Database (VLE Data) of learning objects while
preserving the ability to identify learning objects by a teacher or education manager.
Information Technology (IT) is a tool like the other tools presented total quality management organization achieve its goals. Over the past few decades, computers and quality management practices have evolved together and have supported each other. This interdependence will continue in the near future. Also, IT is defined as computer technology for processing and storing information, as well as communications technology transmitting information.
Bluetooth is an essential wireless standard for short-distance and low-power wireless networks. Health
departments’ contact-tracing applications depended on Bluetooth technology to prevent infectious diseases
from spreading, especially COVID-19. The security threats of the Bluetooth-based contact-tracing
applications increased because an adversary can use them as surveillance tools that violate the user’s
privacy and revealpersonal information. The Bluetooth standard mainly depends on the device address in
its authenticated pairing mechanism (Secure Simple Pairing), which can collect with off-the-shelf
hardware and software and leads to a tracking attack. To avoid the risk of tracking based on this security
vulnerability in the Bluetooth protocol, we suggest a novel authentication protocol based on a non-
interactive zero-knowledge scheme to substitute the authentication protocol used in the Bluetooth standard.
The new protocol can replace the authentication protocol in the Bluetooth stack without any modification
in the device pairing flow. Finally, we prove the security of our proposed scheme against the man-in-the-
middle attack and tracking attack. A performance comparison with the authentication algorithm in the BLE
standard shows that our method mitigates the tracking attack with low communication messages. Our
results help enhance the contact-tracing application’s security in which Bluetooth access is available.
IRJET- Review On Semantic Open IoT Service PlatformIRJET Journal
This document discusses a review of a semantic open IoT service platform. The platform aims to provide semantic-based IoT information services and semantic interoperability between IoT devices. It allows for collecting information from smart devices in real environments and providing smart life services by sharing, distributing, and participating in open sensing information. The platform architecture consists of different domains like user, application, sensor, and processing domains. It uses semantic technologies to enable semantic interoperability between domains by representing collected data semantically.
The document proposes an Interactive Application Service (IAS) that uses cloud computing and social networking technologies to allow researchers to easily discover, share, and access applications from anywhere at any time. The IAS architecture includes a cloud infrastructure layer, IAS service layer, and social networking front-end layer. Users can run applications in the cloud through the social networking portal. The IAS has been implemented on the GeoChronos portal to enable earth observation scientists to share applications and data.
Mobile Provisioning Enterprise Network PON-Revisi-Final - EnglishMuharam Cahyadi
This paper proposes renewing the mobile provisioning system for Passive Optical Networks (PON) in line with the development of the Internet of Things ecosystem. The proposed system uses an Android application on a smartphone with an RFID scanner as a client to automate the provisioning process. This allows provisioning times to be reduced by half compared to the previous manual system and reduces operational costs. The system architecture includes registration, database, billing and RADIUS servers that communicate via open APIs to provision new customers onto the PON network automatically.
there is an obvious trend toward the future Internet
environment, where billions of sensors are connected in a highly
dynamic environment to provide fine-grained information about
the physical world. Applications that utilize such information are
smart and belong to the Internet of Things (IOT) paradigm.
There is a need for IOT systems to have a higher understanding
of the situations in which to provide services or functionalities, to
adapt accordingly. Information context should be collected,
modeled, inferred, and distributed to serve IOT applications with
the required knowledge. Developing context-awareness IOT
applications demands a specialized framework that helps in
applying computations transparently on the cloud and feed the
context-awareness IOT applications with appropriate context
information to prevent the direct access of the context sources.
In this paper, a framework for developing context-aware IOT
applications is proposed. The framework is distributed,
autonomous, and adaptive to fit the IOT applications’
characteristics. The proposed framework utilizes agent’s
technology as well as semantic-based features to provide the basic
functionality required to develop a context-awareness IOT
application. A scenario for elder healthcare is explained to
evaluate this framework.
Study of Resource Discovery trends in Internet of Things (IoT)Eswar Publications
Internet of Things (IoT) ecosystem is progressing at an enormous speed with interconnection of various heterogeneous smart devices. IoT computing paradigm is different from the traditional system where the end users are well aware about the software installed on their personal devices and their services. However, in IoT, people may not be aware about the available resources, services and capabilities provided in an open public space. Thus there is a need for strong interaction between things and people in IoT. Automatic resource discovery forms the core functionality for configuration and maintenance of the deployed objects and integration of new devices with least human intervention. In this paper, we present the current resource discovery, service technologies in IoT and their advantages and shortcomings. A comprehensive view of the various challenges involved in resource discovery and service integration in IoT ecosystem is analyzed. The insight for future research, standardization of
work is provided.
Semantic Web concepts used in Web 3.0 applicationsIRJET Journal
This document discusses how semantic web concepts can be used in applications for Web 3.0. It provides examples of how semantic web could be applied in areas like medical sciences, search engines, and e-learning. Specifically, it describes how semantic web could help integrate medical data from different sources, enable more accurate medical diagnosis and treatment recommendations based on patient history. It also discusses how a semantic search engine like Swoogle works by tagging web pages with metadata to better understand context and return more relevant search results. Finally, it touches on how a semantic web architecture could enable more sophisticated e-learning systems by linking educational resources.
Open Source Platforms Integration for the Development of an Architecture of C...Eswar Publications
The goal of the Internet of Things (IoT) is to achieve the interconnection and interaction of all kind of everyday
objects. IoT architecture can be implemented in various ways. This paper presents a way to mount an IoT architecture using open source hardware and software platforms and shows that this is a viable option to collect information through various sensors and present it through a web page.
Assignment Of Sensing Tasks To IoT Devices Exploitation Of A Social Network ...Dustin Pytko
The document proposes exploiting a Social Internet of Things (SIoT) paradigm to assign sensing tasks to IoT devices in a mobile crowdsensing (MCS) scenario. A new algorithm is presented to fairly allocate resources and sensing tasks among devices while extending device lifetime. The algorithm creates an energy consumption profile for each device and task that is shared over the SIoT network. Emulations showed the proposed approach extended the time for the first device's battery to deplete by over 40% compared to alternative approaches.
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET Journal
This document discusses pervasive computing service discovery in a secure framework environment. It describes the objectives and features of service discovery, including service description, discovery architecture, announcement and querying of services, service usage, configuration updates, and various industry approaches to service discovery like SLP and Jini. It also discusses designing a taxonomy for the environment setup and the importance of security and privacy in service discovery, including user authentication, authorization, confidentiality, integrity, availability, and privacy. Security technology is a central feature for the success of pervasive computing systems.
Geochronos File Sharing Application Using CloudIJERA Editor
Accessing, running and sharing applications and data at present face many challenges. Cloud Computing and Social Networking technologies have the potential to simplify or eliminate many of these challenges. Social Networking technologies provide a means for easily sharing applications and data. Now a day’s people want to be connected 24x7 to the world around them. Networking and Communication have come together to make the world a small place to live in. People want to be in constant touch with their subordinates where ever they are and avail emergency services whenever needed. In this paper we present an on-line/on-demand interactive application service (Software as a Service). The service is built on a cloud computing basement that provisions virtualized application servers based on user demand. An open source social networking platform is leveraged to establish a portal front-end that enables applications and results to be easily shared between users. In the proposed system users can access the documents uploaded into the cloud by others and provide any data they have in hand to other users through the same cloud. This also allows the users to have an interactive session through the chat screens present in the cloud. The paper also highlights some major security issues existing in current cloud computing environment.
This document discusses providing sensor data as a service. It proposes an event collaboration model where sensor data is pushed to a database when it changes, rather than requiring polling. This would allow users to access up-to-date data through queries. The system would contain various sensors that store data in a database, and provide an interface for users to access visualizations and downloads of the sensor data in different formats like CSV and JSON.
This document discusses providing sensor data as a service. It proposes an event collaboration model where sensor data is pushed to a database when it changes, rather than requiring polling. This would allow users to access up-to-date data through queries. The system would contain various sensors that store data in a database, and provide an interface for users to access visualizations and downloads of the sensor data in different formats like CSV and JSON.
IRJET- Android Application for WIFI based Library Book LocatorIRJET Journal
This document describes an Android-based mobile application called the WIFI Based Library Book Locator that helps users locate books within a library. The application connects to a local server in the library via WIFI and provides the user with the precise location of a book along with a path to find it. It also allows users to check the status of multiple books. The system uses a 3-tier architecture with a database layer to store book information, an application layer to handle navigation and data flow, and a network layer to connect via WIFI. It provides a simple interface for users to search for books and view their locations.
Designing and configuring context-aware semantic web applicationsTELKOMNIKA JOURNAL
Context-aware services are attracting attention of world as the use of web services are rapidly growing. We designed an architecture of context-aware semantic web which provides on demand flexibility and scalability in extracting and mining the research papers from well-known digital libraries i.e. ACM, IEEE and SpringerLink. This paper proposes a context-aware administrations system, which supports programmed revelation and incorporation of setting dependent on Semantic Web administrations. This work has been done using the python programming language with a dedicated library for the semantic web analysis named as “Cubic-Web” on any defined dataset, in our case as we have used a dataset for extracting and studying several publications to measure the impact of context aware semantic web application on the results. We have found the average recall and averge accuracy for all the context aware research journals in our research work. Moreover, as this study is limited journal documents, other future studies can be approached by examining different types of publications using this advance research. An efficient system has been designed considering the parameters of research article meta-data to find out the papers from the web using semantic web technology. Parameters like year of publication, type of publication, number of contributors, evaluation methods and analysis method used in publication. All this data has been extracted using the designed context-aware semantic web technology.
The three papers discuss cloud-IoT architectures for remote health monitoring. Paper 1 proposes a platform using cloud computing to manage mobile and wearable healthcare sensors. Paper 2 builds an integrated sensor system connecting various sensors to the cloud for data collection and processing. Paper 3 proposes a sensing service scenario to improve sensor data accessibility and usage for health monitoring through interaction between medical staff and sensing service providers.
Internet of things (IoT) has started growing due to the developments in RFID, sensors, communication technologies and Internet protocols. The basic aim is to connect sensors in a straight line devoid of human association in the vicinity of help in creation of new types applications. The revolution in mobile, Internet in addition to machine-to-machine (M2M) technologies preserve is seen when the primary step towards IoT. Internet of Things (IoT) is forwarding the association among the objects (the “things”) and the backend systems passing through the Internet. Every object can become connected and smart. As a result, the background is monitored via sensing the background furthermore the data are transferred toward cloud with internet connectivity of the things. The monitoring environment comes closer in spite of distance. There are several platforms that provide services such as data analytics, business analytics, notification, etc. Each platform provides a specific service In this expose, we examine a delegate section of these platforms, together open- source and proprietary, on the source of their capability to convene the potential of dissimilar IoT users. The evaluation focuses on how prepared and functional these platforms are for IoT ecology players, other than on the peculiarities of the essential scientific layers. This paper mainly aims to provide a summary of different platforms and stages for IOT. This paper would help the IoT users to decide their best platform to suit their application.
The document presents a user privacy framework called Smart Home Web of Object User Privacy (SWOPR) architecture to protect user personal identifiable information (PII) in smart home environments. The SWOPR introduces two new nodes: the Smart Home Web of Objects Privacy Controller (SWOPC) which controls the collection and release of user PII according to user consent, and the Smart Home Web of Objects Privacy Processor (SWOPP) which provides privacy functions like anonymization and encryption of user PII under the control of the SWOPC. The proposed framework uses a RESTful approach and integrates ISO/IEC-29101 and XACML policies to govern the acquisition and sharing of user PII in smart home systems
IRJET - Labtrust-Android Application for Pathology LaboratoryIRJET Journal
This document describes the development of an Android application called LabTrust to digitize pathology laboratory services. The application aims to address issues with the existing manual system such as wasted time and effort managing paper records, potential for errors, and inconvenience for patients. The proposed system would allow patients and laboratories to communicate electronically and share digital test reports. It would save patient time and resources by allowing them to easily access and share reports with doctors. The application would be developed in modules including a user interface, links between pages and the database, and backend database. Technologies used include Android Studio, .NET, Java, and Firebase. The system is intended to streamline the patient process and make work easier for both patients and doctors.
RT-RCT: an online tool for real-time retrieval of connected thingsjournalBEEI
The document proposes an online tool for real-time retrieval of connected things based on network port scanning. The tool allows users to search for and obtain information about IoT devices in real-time, displaying details like device state, ports, protocols, OS, and more. The tool was developed as a web application using Python libraries to provide an easy-to-use interface for retrieving current data on connected devices.
Offline and Online Bank Data Synchronization Systemijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Similar to Semantic open io t service platform technology (20)
Android Application managing activites.pptxPoornima E.G.
Managing the state of activities is important for a smooth user experience. When configuration changes occur, like screen rotation, the onSaveInstanceState and onRestoreInstanceState methods can be used to save an activity's state and restore it later. For example, these methods can be used to save the value of a counter and restore it after a screen rotation to maintain the count. Implicit intents do not explicitly specify the component to start and instead declare the action to perform, allowing the system to choose an appropriate app to handle it, like using an implicit intent with ACTION_VIEW to open a URL with a browser app.
ROUND4GuestFacultyAllotmentList,Noworkloadcandidates.pdfPoornima E.G.
This document contains a list of 15 candidates who have been allotted colleges and subjects to teach as guest faculty for the 2022-23 academic year. It provides each candidate's name, registration number, allotted subject, total marks obtained, ID of allotted college, and name of allotted college. Candidates are to report for duty between July 1st and 4th, 2023, and have only been selected for the current academic year.
Java provides two frameworks for building GUI applications: AWT and Swing. AWT (Abstract Window Toolkit) is the older framework and provides platform-dependent components. Swing is more advanced and its components are platform-independent. Both frameworks use containers like frames and panels to hold other components like buttons, text fields, and labels. Applets are Java programs that run in web browsers and extend the Applet class. They have a lifecycle of init(), start(), paint(), stop(), and destroy() methods. Graphics methods like drawString() are used to display graphics in applets. AWT and Swing components can both be used within applets.
VTU MCA 2022 JAVA Exceeption Handling.docxPoornima E.G.
The document discusses exception handling in Java. It defines exceptions as events that disrupt normal program flow and explains that exception handling allows the rest of the program to continue executing after an error occurs. It outlines the advantages of exception handling like improved reliability and flexibility. The document also covers exception hierarchies, checked vs unchecked exceptions, common exception types, and provides an example of exception handling code.
This document discusses processes and threads. It begins by defining processes and describing their states, creation, termination, and hierarchies. It then defines threads as components within a process that can run concurrently. Various thread implementations and usages are described, along with techniques for process synchronization and communication like semaphores, monitors, and message passing. The document concludes by discussing scheduling goals and algorithms for batch, interactive, and real-time systems.
This document provides an overview of the FreeBSD operating system. It discusses UNIX history, design principles, and key components such as the programmer interface, user interface, process management, memory management, file system, and interprocess communication. The document is divided into sections on these topics, with subsections on related concepts such as system calls, process control blocks, CPU scheduling, and memory management techniques.
This document provides an overview of the .NET framework and C# programming language. It covers .NET basics like the Common Language Runtime and supported languages. It then discusses C# basics such as types of applications and a simple program example. The remainder of the document details various C# code elements like types, arrays, properties, indexers, inheritance, and delegates.
Millimeter wave mobile communications for 5 g CellularPoornima E.G.
This document summarizes research on using millimeter wave frequencies for 5G cellular networks as a solution to address increasing bandwidth demands. It discusses how directional antennas and wider channel bandwidth at mm-wave frequencies could enable multi-gigabit mobile data speeds. The document also reviews myths around rain attenuation at mm-wave bands and shows that for small cell sizes of 200m, rain impact is minimal. It presents motivation, methodology and initial measurement results showing 28GHz and 38GHz can be used for cellular with directional antennas.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
2. which IoT resources should be accessed. In the open IoT
service platform, each application does not need to know how
to access heterogeneous IoT middleware nor which IoT
resources should be accessed. In the open IoT service platform,
IoT application only requests to open IoT service platform and
remaining processing is done by the open IoT service platform.
The open IoT platform converts request from applications into
specific request for different IoT middleware. The ultimate
goal of the open IoT service platform is to provide the
application with the following services;
easy access to and use of the global IoT resource and
sensed data
easy connection of IoT resources
easy development and distribution of various
applications
Figure 2 shows functional architecture of open USN service
platform.
USN middleware1
Interface FE
Application
LOD
Resource
management
FE
LOD linking
FE
Semantic
USN
repository FE
Semantic query FE
Semantic
inference FE
USN middleware2 USN middleware3...
Adaptation FE
Adaptation FE1 Adaptation FE2 Adaptation FEn...
Open USN service platform
Sensor or
sensor network
Figure 2. Funtional Architecture of Semantic Open IoT Service Platform
The functional architecture of open USN service platform
consists of open USN platform and heterogeneous USN
middleware. The open USN platform consists of seven
functional entities (FEs): interface FE, LOD linking FE,
Semantic inference FE, Resource management FE, Semantic
USN repository FE, Semantic query FE and Adaptation FE.
The heterogeneous USN middleware are integrated into the
open USN platform through the Adaptation FEs and USN
resources and sensed data are shared with the other services
through LOD linking FE.
A. Interface FE
Interface FE provides the functions which enables USN
application to obtain open USN services and/or the sensed data
from the open USN service platform. Also, it supports the
functions which allow establishment or maintenance of
connections or disconnection according to the type of a request
for data, and access control to handle access rights for user
authentication and the use of services.
B. LOD Linking FE
LOD linking FE provides the functions which enable users
to access the USN resources and sensed data in the world by
opening the USN resources and sensed data generated from the
open USN service platform to the LOD, and to provide link
between external LOD data and the USN resources and sensed
data from the open USN service platform. It also supports
the interface for query about the USN resources and sensed
data in the LOD, and the functions which allow the application
and management of policies that include criteria about
selection and publication of data to open to the LOD.
C. Semantic Inference FE
Semantic inference FE provides the inference functions
based on the information descried in the ontology schema and
users’ rules by using RDF data stored in the Semantic USN
repository. Through the inference functions, the original raw
data are processed into data with semantics such as context
data. The inferred data are updated into the Semantic USN
repository and utilized in other services. Furthermore, it
provides the functions to compose different kinds of patterns
and levels for inference.
D. Resource Management FE
Resource management FE provides the functions to issue
and manage the identifier and URI of USN resource, and to
manage mapping relations with the address of USN resource.
Also, it supports the functions which enable USN resource to
be automatically registered in the open USN service platform
when USN resource is connected in the network such as
Internet, and applications to obtain and utilize information
about USN resource. It provides the functions which enable
USN resource to actively register its own status and connection
information. By using this information open USN service
platform will support network connection and mobility of USN
resource. Therefore, it can support plug and play functions
which enable the open USN service platform to dynamically
use USN resource as USN resource which automatically
connects to the open USN service platform and registers its
own status and property information. It provides the functions
to search identifiers of USN resources for performing queries
which can provide necessary information for requests from
applications. In some cases, it can provide the functions to
configure and manage a logical group on USN resource for
satisfying applications’ service requests. It may perform the
functions to create a resource group according to applications’
service request and to manage list of USN resource which
belongs to the resource group. Also, it supports the functions to
create, maintain and manage information such as the purpose
of the resource group, makers, control with right and so on. It
provides the functions to manage the lifecycle of each resource
group according to the duration of service.
2014 IEEE World Forum on Internet of Things (WF-IoT)
86
3. E. Semantic USN Repository FE
Semantic USN repository FE stores metadata of USN
resources and sensed data collected from USN middleware for
a certain period of time as a physical repository. Also, it
provides API functions to query for inserting new data,
searching, querying, and deleting stored data. When metadata
of USN resources and sensed data are stored in Semantic USN
repository, semantic USN repository FE translates them into
RDF form according to predefined rules.
F. Semantic Query FE
Semantic query FE performs the functions to handle queries
to USN middleware and USN repository for providing
responses to applications’ information requests. It consists of
query analyser function, middleware query function and
SPARQL query function. The query analyser function provides
the functions to create queries by analysing intention of
applications’ requests, to translate the results of query process
according to applications’ message specifications, and to
deliver the translated data to applications. It classifies requests
from applications into query to middleware and query to USN
repository. The query to middleware, which requests the sensed
data from USN resource through USN middleware, is created
according to APIs that USN middleware provides. The query to
USN repository, which requests the USN resources and sensed
data from the Semantic USN repository, is created by
translating queries that applications request into SPARQL. The
middleware query function performs the functions to send
queries to USN middleware, and to collect the resulting data
from USN middleware. It provides the functions to manage
query status about lots of queries to USN middleware created
from the query analyser function, and to deliver the data
received temporarily or periodically from USN middleware to
the Semantic USN repository FE. However, in some cases, like
having a real-time sensed data request, the sensed data can be
directly sent to the query analyser function. The SPARQL
query function performs the functions to simultaneously handle
lots of SPARQL queries created from the query analyser
function, and to produce the outcome of query from the
Semantic USN repository, and to deliver them to the query
analyser function.
G. Adaptation FE
Adaptation FE provides the functions which handle the
protocol and message for setting up connection with USN
middleware and delivering queries and commands. It works as
an interface for processing several types of data generated from
heterogeneous USN middleware in the open USN service
platform. It supports the message translation function to
translate the generated data from heterogeneous USN
middleware according to proper message specifications to deal
with in the open USN service platform. It also provides the
message routing function to deliver the translated data to
corresponding FE (USN Semantic Repository FE, Resource
management FE and Semantic query FE) of the open USN
service platform in order to process requests.
III. EXAMPLE: SEMATNC SLEEP MANAGEMENT SERVICE
Semantic-based sleep management service is described as
an example service of the proposed semantic open IoT service
platform. The semantic-based sleep management service
architecture consists of two modules: the Sensor Data Collector
and the Semantic Processor. The Sensor Data Collector is
located in Adaptation FE and Semantic USN Repository FE,
and Semantic Processor is located in Semantic Inference FE in
the proposed platform. The Sensor Data Collector is the
module for collecting sensor specification and sensor
observation and translating sensor data(i.e., sensor data
detected from healthcare sensors and environmental sensors)
into semantic data(i.e., RDF, RDFS, and OWL). In detail, it
has the Collector, which collect sensor data gathered from
healthcare sensor networks(e.g., blood pressure, blood sugar,
body temperature, snoring, sleep apnea) and environmental
sensors(e.g., temperature, humidity, illumination, weather) and
convert input data formatted the Sensor Web
Enablement(SWE) O&M(Observation & Measurement) into
JSON(JavaScript Object Notation) mainly used for exchanging
information on Internet. Also, the Sensor Data Collector has
the Semantic Translator, which performs translation jobs(i.e.,
semantic annotation) by annotating sensor data, using the
sensor/event/context ontology model and the translation rules
to provide more meaningful information. The Semantic
Processor stores sensor observations in the Sensor DB based
the HBaseTM
which is a distributed, scalable, big data store and
sensor specification translated by the Semantic Translator and
private health information formatted the RDF in the Semantic
Repository. It derive contextual knowledge from aggregated
data, using the Context Reasoner which performs the ontology
based inference. The service can query the derived contextual
knowledge stored in the Semantic Repository, using the
SPARQL(Sparql Protocol and RDF Query Language). Figure 3
shows an overall architecture of the sleep management service.
Figure 3. The overall architecture of the sleep management service
A. Semantic Ontology for Sleep Management Service
The sleep management service is composed of a real event
ontology and service domain ontology in the proposed platform.
The real event ontology means a commonly applied ontology
2014 IEEE World Forum on Internet of Things (WF-IoT)
87
4. which is independent with specific service domain for
description of sensor data itself and event data abstracted from
sensor data and metadata. The service domain ontology is built
to derive context data from sensor data and/or event data
according to a specific service domain such as healthcare. The
real event ontology consists of 5 sub-ontologies such as
resource, time, space, weather, community. The service domain
ontology also consists of 5 sub-ontologies such as agent, policy,
event, context, service. Figure 4 shows the structure of each
ontologies.
Figure 4. The Structure of Semantic Ontology for Sleep Management Service
Resource sub-ontology based on Semantic Sensor Network
of W3C Incubator Group contains specification of various
sensor and real-time sensor observation received from the
service. This sub-ontology is divided into 2 parts: “Object”
class and “ObservationValue” class. The “Object” class
represents the specification of sensors and the
“ObservationValue” class represents real-time sensor
observation. Also, it relates to space as sensor’s position, time
as sensor observation’s sensing time, and event as information
abstracted the sensor observation. Figure 5 shows the structure
of resource ontology.
Figure 5. The Structure of Resource Ontology
Time sub-ontology based on OWL-Time ontology[4],
which is standard ontology on time, expresses continuous time
data received from sensor observation as discrete time-
conceptual information. This sub-ontology extends quantitative
time value into abstract time concepts(e.g., “winter”,
“morning”, “noon”, “dawn”, etc). Also, Using the temporal
reasoning[5], we create the relation between time concepts,
such as “before”, “after”, “inside”. In Figure 6, this ontology
store single time instant(e.g., “2013-09-09T13:32:23”), using
owl:TimeInstant class and owl:DurationDescription of OWL-
Time ontology class and store single time interval(e.g.,
“interval_101 named “EarlyAutumnInterval” between 8 month
23 day and 9 month 23). In this case, we derive single inferred
triple(e.g., “TMP-20130909133223 owl:insides Interval_101”),
using Table 1 ‘s SWRL(Semantic Web Rule Language) rule.
TABLE I. OWL:INSIDE RELATIONSHIP DERIVING RULE (SWRL
owl:TimeInstant(?x) owl:hasDurationDescription(?x, ?d)
owl:Interval(?v) owl:hasBeginning(?v, ?b)
owl:hasDurationDescription(?b, ?bd)
owl:months(?d, ?month) owl:days(?d, ?day)
owl:months(?bd, ?bm) owl:days(?bd, ?bd)
swrlb:greatThanOrEqual(?bm ,?month)
owl:hasEnding(?v, ?e)
owl:hasDurationDescription(?e, ?ed)
owl:months(?ed, ?em) owl:days(?ed, ?ed)
swrlb:lessThanOrEqual(?em ,?month)
-> owl:inside(?x, ?v)
IV. CONCLUSION
In this paper, we introduces a semantic open IoT service
platform which can support the semantic interoperability
between various IoT devices, and The semantic-based sleep
management service’s user application program was developed
on Android smartphone. Each services offer the user with
various services such as verifying sleep satisfaction,
providing the aggregated sensor observations and analyzed
sleep pattern. This service has shown that the semantic based
sensor specification and observation has advantage in the
sensor’s interoperability and service scalability on the proposed
semantic open IoT service platform.
REFERENCES
[1] James Manyika, Michael Chui, Jacques Bughin, and Richard Dobbs,
Peter Bisson, and Alex Marrs, "Disruptive technologies: Advances that
will transform life, business, and the global economy", McKinsey
Global Institute, May 2013.
[2] Michael Comption, Payam Barnaghi, Luis Bermudez, Raul Carcia-
Castro, Oscar Corcho, Simon Cox, John Graybeal, Manfred Hauswirth,
Cory Henson, Arthur Herzog, Vincent Huang, Krzysztof Janowicz, W.
David Kelsey, Danh Le Phuoc, Laurent Lefort, Myriam Leggieri, Holger
Neuhaus, Andriy Nikolov, Kevin Page, Alexandre Passant, Amit Sheth,
Kerry Taylor, “The SSN ontology of the W3C semantic sensor network
incubator group,” Journal of Web Semantics, 2012.
[3] Ian G Smith, Ovidiu Vermesan, Peter Friess, Anthony Furness, “The
Internet of Things 2012 – New Horizens,” IERC, 2012.
[4] W3C, Time ontology in OWL(2006).Available online:
http://www.w3.org/1005/TR/owl-time.
[5] James, F. Allen. Planning as Temporal Reasoning. In The second
international conference on principles of knowledge Representation and
Reasoning , 1991.
2014 IEEE World Forum on Internet of Things (WF-IoT)
88